manager_linux.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. // Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package dns
  5. import (
  6. "bytes"
  7. "context"
  8. "errors"
  9. "fmt"
  10. "os"
  11. "time"
  12. "github.com/godbus/dbus/v5"
  13. "inet.af/netaddr"
  14. "tailscale.com/types/logger"
  15. "tailscale.com/util/cmpver"
  16. )
  17. type kv struct {
  18. k, v string
  19. }
  20. func (kv kv) String() string {
  21. return fmt.Sprintf("%s=%s", kv.k, kv.v)
  22. }
  23. func NewOSConfigurator(logf logger.Logf, interfaceName string) (ret OSConfigurator, err error) {
  24. env := newOSConfigEnv{
  25. fs: directFS{},
  26. dbusPing: dbusPing,
  27. nmIsUsingResolved: nmIsUsingResolved,
  28. nmVersionBetween: nmVersionBetween,
  29. resolvconfStyle: resolvconfStyle,
  30. }
  31. mode, err := dnsMode(logf, env)
  32. if err != nil {
  33. return nil, err
  34. }
  35. switch mode {
  36. case "direct":
  37. return newDirectManagerOnFS(logf, env.fs), nil
  38. case "systemd-resolved":
  39. return newResolvedManager(logf, interfaceName)
  40. case "network-manager":
  41. return newNMManager(interfaceName)
  42. case "debian-resolvconf":
  43. return newDebianResolvconfManager(logf)
  44. case "openresolv":
  45. return newOpenresolvManager()
  46. default:
  47. logf("[unexpected] detected unknown DNS mode %q, using direct manager as last resort", mode)
  48. return newDirectManagerOnFS(logf, env.fs), nil
  49. }
  50. }
  51. // newOSConfigEnv are the funcs newOSConfigurator needs, pulled out for testing.
  52. type newOSConfigEnv struct {
  53. fs wholeFileFS
  54. dbusPing func(string, string) error
  55. nmIsUsingResolved func() error
  56. nmVersionBetween func(v1, v2 string) (safe bool, err error)
  57. resolvconfStyle func() string
  58. isResolvconfDebianVersion func() bool
  59. }
  60. func dnsMode(logf logger.Logf, env newOSConfigEnv) (ret string, err error) {
  61. var debug []kv
  62. dbg := func(k, v string) {
  63. debug = append(debug, kv{k, v})
  64. }
  65. defer func() {
  66. if ret != "" {
  67. dbg("ret", ret)
  68. }
  69. logf("dns: %v", debug)
  70. }()
  71. bs, err := env.fs.ReadFile(resolvConf)
  72. if os.IsNotExist(err) {
  73. dbg("rc", "missing")
  74. return "direct", nil
  75. }
  76. if err != nil {
  77. return "", fmt.Errorf("reading /etc/resolv.conf: %w", err)
  78. }
  79. switch resolvOwner(bs) {
  80. case "systemd-resolved":
  81. dbg("rc", "resolved")
  82. // Some systems, for reasons known only to them, have a
  83. // resolv.conf that has the word "systemd-resolved" in its
  84. // header, but doesn't actually point to resolved. We mustn't
  85. // try to program resolved in that case.
  86. // https://github.com/tailscale/tailscale/issues/2136
  87. if err := resolvedIsActuallyResolver(bs); err != nil {
  88. dbg("resolved", "not-in-use")
  89. return "direct", nil
  90. }
  91. if err := env.dbusPing("org.freedesktop.resolve1", "/org/freedesktop/resolve1"); err != nil {
  92. dbg("resolved", "no")
  93. return "direct", nil
  94. }
  95. if err := env.dbusPing("org.freedesktop.NetworkManager", "/org/freedesktop/NetworkManager/DnsManager"); err != nil {
  96. dbg("nm", "no")
  97. return "systemd-resolved", nil
  98. }
  99. dbg("nm", "yes")
  100. if err := env.nmIsUsingResolved(); err != nil {
  101. dbg("nm-resolved", "no")
  102. return "systemd-resolved", nil
  103. }
  104. dbg("nm-resolved", "yes")
  105. // Version of NetworkManager before 1.26.6 programmed resolved
  106. // incorrectly, such that NM's settings would always take
  107. // precedence over other settings set by other resolved
  108. // clients.
  109. //
  110. // If we're dealing with such a version, we have to set our
  111. // DNS settings through NM to have them take.
  112. //
  113. // However, versions 1.26.6 later both fixed the resolved
  114. // programming issue _and_ started ignoring DNS settings for
  115. // "unmanaged" interfaces - meaning NM 1.26.6 and later
  116. // actively ignore DNS configuration we give it. So, for those
  117. // NM versions, we can and must use resolved directly.
  118. //
  119. // Even more fun, even-older versions of NM won't let us set
  120. // DNS settings if the interface isn't managed by NM, with a
  121. // hard failure on DBus requests. Empirically, NM 1.22 does
  122. // this. Based on the versions popular distros shipped, we
  123. // conservatively decree that only 1.26.0 through 1.26.5 are
  124. // "safe" to use for our purposes. This roughly matches
  125. // distros released in the latter half of 2020.
  126. //
  127. // In a perfect world, we'd avoid this by replacing
  128. // configuration out from under NM entirely (e.g. using
  129. // directManager to overwrite resolv.conf), but in a world
  130. // where resolved runs, we need to get correct configuration
  131. // into resolved regardless of what's in resolv.conf (because
  132. // resolved can also be queried over dbus, or via an NSS
  133. // module that bypasses /etc/resolv.conf). Given that we must
  134. // get correct configuration into resolved, we have no choice
  135. // but to use NM, and accept the loss of IPv6 configuration
  136. // that comes with it (see
  137. // https://github.com/tailscale/tailscale/issues/1699,
  138. // https://github.com/tailscale/tailscale/pull/1945)
  139. safe, err := env.nmVersionBetween("1.26.0", "1.26.5")
  140. if err != nil {
  141. // Failed to figure out NM's version, can't make a correct
  142. // decision.
  143. return "", fmt.Errorf("checking NetworkManager version: %v", err)
  144. }
  145. if safe {
  146. dbg("nm-safe", "yes")
  147. return "network-manager", nil
  148. }
  149. dbg("nm-safe", "no")
  150. return "systemd-resolved", nil
  151. case "resolvconf":
  152. dbg("rc", "resolvconf")
  153. style := env.resolvconfStyle()
  154. switch style {
  155. case "":
  156. dbg("resolvconf", "no")
  157. return "direct", nil
  158. case "debian":
  159. dbg("resolvconf", "debian")
  160. return "debian-resolvconf", nil
  161. case "openresolv":
  162. dbg("resolvconf", "openresolv")
  163. return "openresolv", nil
  164. default:
  165. // Shouldn't happen, that means we updated flavors of
  166. // resolvconf without updating here.
  167. dbg("resolvconf", style)
  168. logf("[unexpected] got unknown flavor of resolvconf %q, falling back to direct manager", env.resolvconfStyle())
  169. return "direct", nil
  170. }
  171. case "NetworkManager":
  172. // You'd think we would use newNMManager somewhere in
  173. // here. However, as explained in
  174. // https://github.com/tailscale/tailscale/issues/1699 , using
  175. // NetworkManager for DNS configuration carries with it the
  176. // cost of losing IPv6 configuration on the Tailscale network
  177. // interface. So, when we can avoid it, we bypass
  178. // NetworkManager by replacing resolv.conf directly.
  179. //
  180. // If you ever try to put NMManager back here, keep in mind
  181. // that versions >=1.26.6 will ignore DNS configuration
  182. // anyway, so you still need a fallback path that uses
  183. // directManager.
  184. dbg("rc", "nm")
  185. return "direct", nil
  186. default:
  187. dbg("rc", "unknown")
  188. return "direct", nil
  189. }
  190. }
  191. func nmVersionBetween(first, last string) (bool, error) {
  192. conn, err := dbus.SystemBus()
  193. if err != nil {
  194. // DBus probably not running.
  195. return false, err
  196. }
  197. nm := conn.Object("org.freedesktop.NetworkManager", dbus.ObjectPath("/org/freedesktop/NetworkManager"))
  198. v, err := nm.GetProperty("org.freedesktop.NetworkManager.Version")
  199. if err != nil {
  200. return false, err
  201. }
  202. version, ok := v.Value().(string)
  203. if !ok {
  204. return false, fmt.Errorf("unexpected type %T for NM version", v.Value())
  205. }
  206. outside := cmpver.Compare(version, first) < 0 || cmpver.Compare(version, last) > 0
  207. return !outside, nil
  208. }
  209. func nmIsUsingResolved() error {
  210. conn, err := dbus.SystemBus()
  211. if err != nil {
  212. // DBus probably not running.
  213. return err
  214. }
  215. nm := conn.Object("org.freedesktop.NetworkManager", dbus.ObjectPath("/org/freedesktop/NetworkManager/DnsManager"))
  216. v, err := nm.GetProperty("org.freedesktop.NetworkManager.DnsManager.Mode")
  217. if err != nil {
  218. return fmt.Errorf("getting NM mode: %w", err)
  219. }
  220. mode, ok := v.Value().(string)
  221. if !ok {
  222. return fmt.Errorf("unexpected type %T for NM DNS mode", v.Value())
  223. }
  224. if mode != "systemd-resolved" {
  225. return errors.New("NetworkManager is not using systemd-resolved for DNS")
  226. }
  227. return nil
  228. }
  229. func resolvedIsActuallyResolver(bs []byte) error {
  230. cfg, err := readResolv(bytes.NewBuffer(bs))
  231. if err != nil {
  232. return err
  233. }
  234. // We've encountered at least one system where the line
  235. // "nameserver 127.0.0.53" appears twice, so we look exhaustively
  236. // through all of them and allow any number of repeated mentions
  237. // of the systemd-resolved stub IP.
  238. if len(cfg.Nameservers) == 0 {
  239. return errors.New("resolv.conf has no nameservers")
  240. }
  241. for _, ns := range cfg.Nameservers {
  242. if ns != netaddr.IPv4(127, 0, 0, 53) {
  243. return errors.New("resolv.conf doesn't point to systemd-resolved")
  244. }
  245. }
  246. return nil
  247. }
  248. func dbusPing(name, objectPath string) error {
  249. ctx, cancel := context.WithTimeout(context.Background(), time.Second)
  250. defer cancel()
  251. conn, err := dbus.SystemBus()
  252. if err != nil {
  253. // DBus probably not running.
  254. return err
  255. }
  256. obj := conn.Object(name, dbus.ObjectPath(objectPath))
  257. call := obj.CallWithContext(ctx, "org.freedesktop.DBus.Peer.Ping", 0)
  258. return call.Err
  259. }